A PowerShell solution to discover visible SMB shares, test for access rights, inventory accessible files and flag human readable file contents for sensitive information.
☆27Mar 13, 2023Updated 3 years ago
Alternatives and similar repositories for SMB-Data-Discovery
Users that are interested in SMB-Data-Discovery are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Using PowerShell to quickly scan through the SYSVOL share for exposed credentials within auto logon policies.☆14Nov 30, 2022Updated 3 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Jan 16, 2021Updated 5 years ago
- A python approach to interacting with web shells.☆30Jan 16, 2021Updated 5 years ago
- A solution to create obfuscated download cradles for PowerShell.☆16Aug 1, 2022Updated 3 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Oct 6, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆31Jan 22, 2026Updated 2 months ago
- You don't need wires to be connected☆43Apr 8, 2020Updated 5 years ago
- A collection of code snippets built to assist with breaking chains.☆126Apr 24, 2024Updated last year
- ☆16Jun 13, 2022Updated 3 years ago
- Terraform & Packer code to create an up-to-date Kali Linux AWS EC2 instance☆16Jul 1, 2019Updated 6 years ago
- An open-source process injection enumeration tool written in C#☆174Dec 16, 2022Updated 3 years ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆201Jun 25, 2024Updated last year
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- ☆39Feb 26, 2025Updated last year
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆44Jul 9, 2022Updated 3 years ago
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆46Mar 9, 2020Updated 6 years ago
- ☆42Jan 13, 2023Updated 3 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆151Nov 19, 2021Updated 4 years ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆62Aug 31, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Aug 22, 2025Updated 7 months ago
- A quick and dirty way to bypass encrypted EPA to connect to a NetScaler Gateway☆20Oct 11, 2019Updated 6 years ago
- The code examples for the Level Up Tutorials course Web Components For Beginners.☆12Aug 31, 2021Updated 4 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- Multilayered secret detection tool☆41Feb 11, 2026Updated last month
- GoldenSAML Attack Libraries and Framework☆77Jun 5, 2024Updated last year
- A tiny tool built to help AD Admins tame the Protected Users group.☆140Updated this week
- Becoming the spider, crawling through the webs to catch the fly.☆84Jun 25, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Template project for Offensive Security Exam Documentation☆12Feb 25, 2020Updated 6 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Red Team Collaboration Infrastructure☆98Apr 24, 2025Updated 11 months ago
- ☆12Sep 12, 2021Updated 4 years ago
- Scripts to demonstrate VPC Service Controls between tenant and shared projects☆12Jun 11, 2019Updated 6 years ago
- ☆18Jun 10, 2025Updated 9 months ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago